肖亮(廈門大學教授)

肖亮(廈門大學教授)

肖亮,廈門大學信息科學與技術學院教授,博士生導師,IEEE高級會員,中國計算機學會高級會員,中國電子學會高級會員,網路與數據通信專委會委員。從事無線安全,水聲通信和大數據等方向的研究。獲教育部留學回國人員科研啟動基金,入選福建省高等學校新世紀優秀人才支持計畫。主持和參與了多項國家自然科學基金和福建省自然科學基金研究項目,並參與863項目。擔任IEEE Trans. Information Forensics & Security等國際SCI期刊編委。擔任INFOCOM、GLOBECOM和ICC等國際學術會議技術議程委員。

美國Rutgers(新澤西州立)大學電子與計算機工程系博士,清華大學電子系碩士,南京郵電學院通信工程系學士。作為訪問學者,曾在普林斯頓大學,維吉尼亞理工和馬里蘭大學進行研究。曾任美國Rutgers大學無線信息網路實驗室(WINLAB)助研,美國InterDigital公司和貝爾實驗室實習研究員,美國北卡州立大學ECE系助教,清華大學微波與數字通信國家重點實驗室助研。

基本介紹

  • 中文名:肖亮
  • 國籍:中國
  • 學位/學歷:博士
  • 專業方向:無線通信,網路安全,大數據,機器學習
  • 職務:廈門大學教授
人物經歷,研究方向,主要貢獻,部分科研項目,部分科研成果,

人物經歷

肖亮,廈門大學信息科學與技術學院教授,博士生導師,IEEE高級會員,中國計算機學會高級會員,中國電子學會高級會員,網路與數據通信專委會委員。從事無線安全,水聲通信和大數據等方向的研究。獲教育部留學回國人員科研啟動基金,入選福建省高等學校新世紀優秀人才支持計畫。主持和參與了多項國家自然科學基金和福建省自然科學基金研究項目,並參與863項目。擔任IEEE Trans. Information Forensics & Security等國際SCI期刊編委。擔任INFOCOM、GLOBECOM和ICC等國際學術會議技術議程委員。

研究方向

無線通信,網路安全,大數據,機器學習

主要貢獻

部分科研項目

非預知物理層密鑰的無線網路抗敵意干擾技術研究.國家自然科學基金面上項目,2013.1-2016.12(主持)
基於信道信息的無線網路認證技術研究,國家自然基金青年項目,2011.01-2013.12(主持)
基於物理層信息的無線網路的認證算法及其套用研究,福建省自然基金面上項目,2010 -2013(主持)
基於信道信息的無線網路的身份認證,留學回國人員科研啟動基金,2011(主持)
中央高校基本科研業務費項目,2012-2014(主持)
無線網路雲中物理層安全解決方案開源研究與開發,清華-IBM OCR研究計畫,2011(主持)
認知無線電的安全機制研究,清華-高通無線通信聯合研究計畫,2009 -2012(第二主持)

部分科研成果

Book Chapter:
  1. L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "Chapter 13: Channel-Based Authentication", in "Securing Wireless Communications at the Physical Layer," W. Trappe and R. Liu, Eds., Springer-Verlag New York, 2010.
  2. L. Xiao, "Anti-jamming Transmissions in Cognitive Radio Networks," Springer, 2015, ISBN: 978-3-319-24290-3.
Journal Papers:
  1. H. Zhuang, L. Dai, L. Xiao, and Y. Yao, "Spectral efficiency of distributed antenna system with random antenna layout," Electronics Letter, vol. 39, pp.495, March 2003.
  2. L. Xiao, L. Greenstein, and N. Mandayam, "Sensor-assisted localization in cellular systems," IEEE Trans. Wireless Communications, vol. 6, pp. 4244-4248, Dec. 2007.
  3. L. Xiao, L. Greenstein, N. B. Mandayam, and W. Trappe, "Using the physical layer for wireless authentication under time-variant channels," IEEE Trans. Wireless Communications, vol. 7, pp. 2571-2579, Jul. 2008.
  4. L. Xiao, L. Greenstein, N. Mandayam, and S. Periyalwar, "Distributed measurements for estimating and updating cellular system performance," IEEE Trans. Communications, vol. 56, pp. 991-998, Jun. 2008.
  5. L. Xiao, L. Greenstein, N. B. Mandayam, and W. Trappe, "Channel-based spoofing detection in frequency-selective Rayleigh channels," IEEE Trans. Wireless Communications, vol. 8, no. 12, pp. 5948 - 5956, Dec. 2009.
  6. L. Xiao, L. Greenstein, N. B. Mandayam, and W. Trappe, "Channel-based detection of Sybil attacks in wireless networks," IEEE Trans. Information Forensics & Security, vol. 4, no. 3, pp. 492-503, Sept. 2009.
  7. L. Xiao, H. Dai and P. Ning, "Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping," IEEE Trans. Information Forensics & Security, vol. 7, no. 1, pp. 297 – 309, Feb. 2012.
  8. L. Xiao, H. Dai, P. Ning, "MAC Design of Uncoordinated FH-Based Collaborative Broadcast," IEEE Wireless Comm. Letters, vol. 1, No. 3, pp. 261 - 264, June 2012.
  9. C. Li, H. Dai, L. Xiao, P. Ning, "Communication Efficiency of Anti-jamming Broadcast in Large-scale Multi-Channel Wireless Networks," IEEE Trans. Signal Processing, vol. 60, pp. 5281 - 5292, Oct. 2012.
  10. L. Xiao, W.S Lin, Y. Chen, K.J.R Liu, "Indirect Reciprocity Security Game for Large-Scale Mobile Wireless Networks," IEEE Trans. Information Forensics & Security, vol. 7, No. 4, pp. 1368 – 1380, Aug. 2012.
  11. C. Zhao, L. Xiao et al., "Secure relay selection based on learning with negative externality in wireless networks," EURASIP Journal on Advances in Signal Processing, pp. 1-7, April 2013.
  12. L. Xiao, Q. Yan, W. Lou, G. Chen, Y.T. Hou, "Proximity-based Security Techniques for Mobile Users in Wireless Networks," IEEE Trans. Information Forensics & Security, pp. 2089-2100, vol. 8, no. 12, Dec 2013.
  13. L. Xiao, N. B. Mandayam, and H. V. Poor, "Prospect Theoretic Analysis of Energy Exchange Among Microgrids," IEEE Trans. Smart Grids, vol. 6, no. 1, pp. 63-72, Jan. 2015.
  14. L. Xiao, T. Chen, J. Liu, H. Dai, "Anti-jamming Transmission Stackelberg Game with Observation Errors," IEEE Comm. Letters, vol. 19, no. 6, pp. 949-952, Jun. 2015.
  15. L. Xiao, Y. Li, J. Liu, Y. Zhao, "Power Control with Reinforcement Learning in Cooperative Cognitive Radio Networks against Jamming," Journal of Supercomputing, pp. 1-21, April 2015.
  16. L. Xiao, J. Liu, Q. Li, N. B. Mandayam, and H. V. Poor, "User-centric View of Jamming Games in Cognitive Radio Networks," IEEE Trans. Information Forensics & Security, vol. 10, no. 12, pp. 2578-2590, Dec. 2015.
  17. J. Liu, L. Xiao, G. Liu, Y. Zhao, “Active authentication with reinforcement learning based on ambient radio signals," Springer Multimedia Tools and Applications, pp. 2-22, Oct. 2015.
  18. L. Xiao, Y. Li, G. Han, G. Liu, W. Zhuang, "PHY-layer Spoofing Detection with Reinforcement Learning in Wireless Networks," IEEE Trans. Vehicular Technology, 2016.
  19. L. Xiao, C. Xie, T. Chen, H. Dai, H. V. Poor, "A Mobile Offloading Game Against Smart Attacks," IEEE Access, 2016.
Conference Papers:
  1. L. Xiao, L. Dai, S. Zhou, and Y. Yao, "Information-theoretic capacity analysis in MIMO distributed antenna systems," in Proc. IEEE Vehicular Technology Conference (VTC), vol. 1, pp. 779-782, Jeju, Korea, April 2003.
  2. L. Xiao, S. Zhou, and Y. Yao, "QoS-oriented scheduling algorithm for 4G mobile multimedia OFDM communications," in Proc. IEEE International Symposium on Personal, Indoor and Mobile Radio (PIMRC), vol. 1, pp. 545-549, Sept. 2003, Beijing, China.
  3. L. Xiao, A. Wang, S. Zhou, and Y. Yao, "A dynamic resource scheduling algorithm for OFDM system," in Proc. Asia-Pacific Conference on Communications (APCC), vol. 2, pp. 444-447, Malaysia, Sept. 2003.
  4. A. Wang, L. Xiao, S. Zhou, X. Xu, and Y. Yao, "Dynamic Resource Management in the Fourth Generation Wireless Systems," in Proc. International Conference on Communication Technology (ICCT), Beijing, China, April 2003.
  5. L. Xiao and M. Xiao, "A new kind of MIMO-sensor networks M-SENMA," in Proc. IEEE Vehicular Technology Conference (VTC), vol. 4, pp. 2941-2945, Los Angeles, CA, Sept. 2004.
  6. H. Dai, L. Xiao, and Q. Zhou, "Energy efficiency of MIMO transmission strategies in wireless sensor networks," in Proc. 2004 International Conference on Computing, Communications and Control Technologies (CCCT), Austin, TX, Aug. 2004.
  7. L. Xiao, L. J. Greenstein, N. B. Mandayam, and S. Periyalwar, "Sensor networks for estimating and updating the performance of cellular system," in Proc. IEEE International Conference on Communications(ICC), vol. 5, pp. 2107-2111, June 2006.
  8. D. Samardzija, L. Xiao, and N. Mandayam, "Impact of pilot assisted channel state estimation on multiple antenna multiuser TDD systems with spatial filtering," in Proc. IEEE Conference on Information Sciences and Systems (CISS), pp. 381-385, Princeton, NJ, March 2006.
  9. L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "Fingerprints in the Ether: using the physical layer for wireless authentication," in Proc. IEEE International Conference on Communications(ICC), pp. 4646-4651, June 2007.
  10. L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "MIMO-assisted channel-based authentication in wireless networks," in Proc. Conference on Information Sciences and Systems (CISS), pp. 642-646, Princeton, NJ, Mar. 2008.
  11. L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "A physical-layer technique to enhance authentication for mobile terminals," in Proc. IEEE International Conference on Communications (ICC), pp. 1520-1524, May 2008.
  12. L. Xiao, A. Reznik, W. Trappe, C. Ye, Y. Shah, L. Greenstein, and N. Mandayam, "PHY-Authentication Protocol for Spoofing Detection in Wireless Networks", in Proc. IEEE Global communications conference (GLOBECOM), 2010.
  13. C. Li, H. Dai, L. Xiao, P. Ning, "Analysis and Optimization on Jamming-resistant Collaborative Broadcast in Large-Scale Networks," in Proc. 44th Asilomar Conference on Signals, Systems and Computers (Asilomar), California, USA, Nov. 2010.
  14. L. Xiao, H. Dai, P. Ning, "Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part I: Single-hop Networks," in Proc. IEEE Global communications conference (GLOBECOM'11), Houston, TX, 2011.
  15. L. Xiao, H. Dai, P. Ning, "Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part II: Multihop Networks," in Proc. IEEE Global communications conference (GLOBECOM'11), Houston, TX, 2011.
  16. L. Xiao, W.S Lin, Y. Chen, K.J.R Liu, "Indirect reciprocity game modeling for secure wireless networks," in Proc. IEEE International conference on communications (ICC), Ottawa, Canada, June 2012.
  17. L. Xiao, Q. Yan, W. Lou and Y. T. Hou, "Proximity-based security using ambient radio signals," in Proc. IEEE International conference on communications (ICC), Budapest, Hungary, June 2013.
  18. L. Xiao, Y. Chen, K.J.R Liu, "Anti-Cheating Prosumer Energy Exchange based on Indirect Reciprocity," in Proc. IEEE International conference on communications (ICC), Sydney, Australia, June 2014.
  19. L. Xiao, J. Liu, Y. Li, N. B. Mandayam, and H. V. Poor, "Prospect theoretic analysis of anti-jamming communications in cognitive radio networks," in Proc. IEEE Global Commun. Conf. (GLOBECOM'14), Dec. 2014.
  20. L. Xiao, J. Liu, Q. Li, and H. V. Poor, "Secure Mobile Crowdsensing Game," in Proc. IEEE Int’l Conf. on Commun., (ICC), London, Jun., 2015.
  21. J. Liu, L. Xiao, Y. Li and L. Huang, "User-Centric Analysis on Jamming Game with Action Detection Error," in Proc. Int’l Conf. on Game Theory for Networks, Beijing, China, Dec. 2014.
  22. Y. Li, L. Xiao, J. Liu and Y. Tang, "Power Control Stackelberg Game in Cooperative Anti-Jamming Communications," in Proc. Int’l Conf. on Game Theory for Networks, Beijing, China, Dec. 2014.
  23. T. Chen, J. Liu, L. Xiao and L. Huang, "Learning-based Anti-jamming Transmissions in Heterogenous Cognitive Radio Networks", in Proc. IEEE Wireless Communications and Networking Conference, So-HetNets Workshop, New Orleans, LA, Mar. 2015.
  24. G. Liu, J. Liu, Y. Li, L. Xiao and Y. Tang, "Detection of Jamming Attacks over Smartphones," in Proc. IEEE Vehicular Technology Conf., Glasgow, Scotland, May 2015.
  25. G. Chen, Y. Li, L. Xiao and L. Huang, "Collaborative Anti-jamming Broadcast with Uncoordinated Frequency Hopping over USRP," in Proc. IEEE Vehicular Technology Conf., Glasgow, Scotland, May 2015.
  26. Y. Li, Q. Li, J. Liu, L. Xiao, "Mobile Cloud Offloading for Malware Detections with Learning," in Proc. International Conference on Computer Communications (INFOCOM), -BigSecurity, Hongkong, April 2015.
  27. L. Xiao, Y. Li, G. Liu, Q. Li, W. Zhuang, "Spoofing Detection with Reinforcement Learning in Wireless Networks," in Proc. IEEE Global Communications Conference, San Diego, CA, Dec. 2015.
  28. L. Xiao, Q. Li, T. Chen, E. Cheng, H. Dai, "Jamming Games in Underwater Sensor Networks with Reinforcement Learning," in Proc. IEEE Global Communications Conference, San Diego, CA, Dec. 2015.
  29. L. Xiao, T. Chen, C. Xie, J. Liu, "Mobile Crowdsensing Game in Vehicular Networks," in Proc. IEEE Region 10 Conference (TENCON), invited talk, Nov. 2015.
  30. L. Xiao, C. Xie, T. Chen, H. Dai, H. V. Poor, "Mobile Offloading Game Against Smart Attacks," in Proc. International Conference on Computer Communications (INFOCOM), -BigSecurity, San Francisco, CA, April 2015. (Best paper award)

相關詞條

熱門詞條

聯絡我們